First published: Tue Feb 25 2020(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opensmtpd Opensmtpd | <6.6.4 | |
Fedoraproject Fedora | =32 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
debian/opensmtpd | 6.8.0p2-3 6.8.0p2-4 7.5.0p0-1 |
Ubuntu ships with /proc/sys/fs/protected_hardlinks enabled by default, making this vulnerability not exploitable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2020-8793.
The severity of CVE-2020-8793 is medium.
CVE-2020-8793 allows local users to read arbitrary files on some Linux distributions due to an untrusted search path and race conditions in OpenSMTPD.
OpenSMTPD versions before 6.6.4 are affected by CVE-2020-8793.
To mitigate CVE-2020-8793, you should update OpenSMTPD to version 6.6.4 or apply the recommended fixes for your specific distribution.